[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 38.047338] audit: type=1800 audit(1559108716.206:33): pid=7304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 38.072749] audit: type=1800 audit(1559108716.206:34): pid=7304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 51.534556] audit: type=1400 audit(1559108729.686:35): avc: denied { map } for pid=7480 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.120' (ECDSA) to the list of known hosts. 2019/05/29 05:45:36 fuzzer started [ 57.944165] audit: type=1400 audit(1559108736.096:36): avc: denied { map } for pid=7489 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/05/29 05:45:38 dialing manager at 10.128.0.105:37201 2019/05/29 05:45:38 syscalls: 2457 2019/05/29 05:45:38 code coverage: enabled 2019/05/29 05:45:38 comparison tracing: enabled 2019/05/29 05:45:38 extra coverage: extra coverage is not supported by the kernel 2019/05/29 05:45:38 setuid sandbox: enabled 2019/05/29 05:45:38 namespace sandbox: enabled 2019/05/29 05:45:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/29 05:45:38 fault injection: enabled 2019/05/29 05:45:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/29 05:45:38 net packet injection: enabled 2019/05/29 05:45:38 net device setup: enabled 05:45:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="821bc75516885203fee10200000100e6209f0566e9f4b448bc6ec5a44c31bed4d92ba84fd1d454c01a67abec3a8afe3ef3a58bc574411dc82431766827a6ad1ff9a7371f0000a958145442e37a7d4cec93a1f3e0e6acff61269f004d44e9f5eaed06b6f0cc9aad32ecaefcbe82387282340925342d0525a5fbac6792f9c7e388f7fea6"], 0x83}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f3b7c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4432b1f5c") [ 78.054860] audit: type=1400 audit(1559108756.206:37): avc: denied { map } for pid=7506 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1164 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 78.182416] IPVS: ftp: loaded support on port[0] = 21 [ 78.192421] NET: Registered protocol family 30 [ 78.197286] Failed to register TIPC socket type 05:45:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="000000000000000000000b000000680005001c0002000800010000000000080001000000000008000200000000001c0002000800040000000000080001000000000008000300000000002400020008000100000000000800020000000000080001000000000008000200000000000800010075647000100007000c0003000000000000000000540004000c00010073797a30000000001400010062726f6164636173742d6c696e6b00000c00010073797a30000000000c00070008000200000000000c00070008000300000000000c00010073797a300000000014000200080001000000000008000100000000003c0001000c00020008000200000000002c00040014000100020000000000000000000000000000001400020002000000e00000020000000000000000"], 0x1}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 78.442269] IPVS: ftp: loaded support on port[0] = 21 [ 78.459196] NET: Registered protocol family 30 [ 78.463785] Failed to register TIPC socket type 05:45:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x38}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 78.698758] IPVS: ftp: loaded support on port[0] = 21 [ 78.718631] NET: Registered protocol family 30 [ 78.723240] Failed to register TIPC socket type 05:45:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x0) [ 79.192222] IPVS: ftp: loaded support on port[0] = 21 [ 79.209536] NET: Registered protocol family 30 [ 79.214126] Failed to register TIPC socket type 05:45:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x30d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4f814c1ab5be2f9660f3a0fae5e090000ba44d8d1c401f5ef1ac4817d73d74ec4a275bd153c78ab7749f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfdc402b504a60080000068d768f833c4a1cd61b3b23c0000ab26dbc1a1fe5ff6f6df0804f4c4efa59cc442abf58f104eb547288ba6452e000054c4431d3e660f6e7f3c") [ 79.862771] IPVS: ftp: loaded support on port[0] = 21 [ 79.899558] NET: Registered protocol family 30 [ 79.904178] Failed to register TIPC socket type 05:45:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000740)={0x9c, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x9c}}, 0x0) syz_execute_func(&(0x7f0000000440)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5bf9e2f9660f3a0fae5e090000ba023c1fb63ac4817d73d74ec482310d46f449f216c863fa438036a91bdbae95aaaa420f383c02c401405c6bfd49d768d768f833fefbab6464660f38323c8f26dbc1a1fe5ff6f6df0804f4c4efa59c0f01c4288ba6452e000054c4431d5cc100") [ 80.603337] IPVS: ftp: loaded support on port[0] = 21 [ 80.640527] NET: Registered protocol family 30 [ 80.655428] Failed to register TIPC socket type [ 81.339605] chnl_net:caif_netlink_parms(): no params data found [ 81.792624] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.959968] bridge0: port 1(bridge_slave_0) entered disabled state [ 82.067526] device bridge_slave_0 entered promiscuous mode [ 82.196998] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.203442] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.337713] device bridge_slave_1 entered promiscuous mode [ 82.836316] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 83.137593] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 83.662565] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 83.796669] team0: Port device team_slave_0 added [ 83.997713] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 84.125324] team0: Port device team_slave_1 added [ 84.226439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 84.396625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 85.112680] device hsr_slave_0 entered promiscuous mode [ 85.410646] device hsr_slave_1 entered promiscuous mode [ 85.583298] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 85.689856] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 85.978882] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 86.605321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.816087] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.975252] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.020591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.066413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.192754] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 87.278157] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.437489] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 87.444544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 87.477193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 87.548525] bridge0: port 1(bridge_slave_0) entered blocking state [ 87.555051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 87.713276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 87.805729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 87.813093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 87.925840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 88.024770] bridge0: port 2(bridge_slave_1) entered blocking state [ 88.031243] bridge0: port 2(bridge_slave_1) entered forwarding state [ 88.185878] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 88.193045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 88.324253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 88.426586] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 88.558131] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 88.626453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 88.634469] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 88.793646] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 88.895765] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 88.902893] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 88.996476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 89.011445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 89.196888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 89.203908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 89.235910] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 89.243750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 89.435830] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 89.558660] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 89.564730] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 89.848871] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 90.185630] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 90.458852] audit: type=1400 audit(1559108768.616:38): avc: denied { associate } for pid=7507 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 05:46:12 executing program 0: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x0) 05:46:13 executing program 0: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x0) 05:46:14 executing program 0: r0 = socket(0x1e, 0x805, 0x0) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req3={0x80000000, 0x0, 0x2}, 0x1c) listen(r1, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x7b, 0x0}, 0x0) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x0) [ 95.909094] IPVS: ftp: loaded support on port[0] = 21 [ 95.927953] IPVS: ftp: loaded support on port[0] = 21 [ 95.942848] NET: Registered protocol family 30 [ 95.947793] list_add double add: new=ffffffff892e71b0, prev=ffffffff890f2d80, next=ffffffff892e71b0. [ 95.949116] IPVS: ftp: loaded support on port[0] = 21 [ 95.957383] cache_from_obj: Wrong slab cache. TIPC but object is from kmalloc-2048 [ 95.957551] WARNING: CPU: 1 PID: 8162 at mm/slab.h:380 kmem_cache_free.cold+0x1c/0x23 [ 95.957559] Kernel panic - not syncing: panic_on_warn set ... [ 95.957559] [ 95.957573] CPU: 1 PID: 8162 Comm: syz-executor.4 Not tainted 4.19.46 #18 [ 95.957581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.957586] Call Trace: [ 95.957592] [ 95.957617] dump_stack+0x172/0x1f0 [ 95.957638] panic+0x263/0x507 [ 95.957652] ? __warn_printk+0xf3/0xf3 [ 95.957671] ? kmem_cache_free.cold+0x1c/0x23 [ 95.957686] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.957701] ? __warn.cold+0x5/0x4a [ 95.957713] ? __warn+0xe8/0x1d0 [ 95.957729] ? kmem_cache_free.cold+0x1c/0x23 [ 95.957756] __warn.cold+0x20/0x4a [ 95.957770] ? kmem_cache_free.cold+0x1c/0x23 [ 95.957785] report_bug+0x263/0x2b0 [ 95.957802] do_error_trap+0x204/0x360 [ 95.957817] ? math_error+0x340/0x340 [ 95.957831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.957844] ? wake_up_klogd+0x99/0xd0 [ 95.957860] ? error_entry+0x76/0xd0 [ 95.957875] ? trace_hardirqs_off_caller+0x65/0x220 [ 95.957895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 95.957913] do_invalid_op+0x1b/0x20 [ 95.957924] invalid_op+0x14/0x20 [ 95.957966] RIP: 0010:kmem_cache_free.cold+0x1c/0x23 [ 95.957992] Code: e8 25 8d 47 05 44 8b 6d c4 e9 74 a5 ff ff 48 8b 48 58 48 c7 c6 40 45 54 87 48 c7 c7 18 64 38 88 49 8b 54 24 58 e8 34 43 b4 ff <0f> 0b e9 89 df ff ff 49 8b 4f 58 48 c7 c6 40 45 54 87 48 c7 c7 18 [ 95.957999] RSP: 0018:ffff8880ae907cf8 EFLAGS: 00010286 [ 95.958011] RAX: 0000000000000046 RBX: ffff888091ae4980 RCX: 0000000000000000 [ 95.958020] RDX: 0000000000000000 RSI: ffffffff81559e76 RDI: ffffed1015d20f91 [ 95.958028] RBP: ffff8880ae907d18 R08: 0000000000000046 R09: ffffed1015d24fe9 [ 95.958036] R10: ffffed1015d24fe8 R11: ffff8880ae927f47 R12: ffff888070d8ad80 [ 95.958044] R13: 0000000000000000 R14: ffff888070d8ad80 R15: ffff888091ae4c90 [ 95.958076] ? vprintk_func+0x86/0x189 [ 95.958105] ? kmem_cache_free.cold+0x1c/0x23 [ 95.958123] __sk_destruct+0x4b4/0x6d0 [ 95.958142] ? tipc_wait_for_connect.isra.0+0x4c0/0x4c0 [ 95.958156] sk_destruct+0x7b/0x90 [ 95.958171] __sk_free+0xce/0x300 [ 95.958187] sk_free+0x42/0x50 [ 95.958202] tipc_sk_callback+0x48/0x60 [ 95.958217] rcu_process_callbacks+0xba0/0x1a30 [ 95.958252] ? __rcu_read_unlock+0x170/0x170 [ 95.958277] ? __lock_is_held+0xb6/0x140 [ 95.958304] __do_softirq+0x25c/0x921 [ 95.958318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.958331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.958356] irq_exit+0x180/0x1d0 [ 95.958388] smp_apic_timer_interrupt+0x13b/0x550 [ 95.958417] apic_timer_interrupt+0xf/0x20 [ 95.958422] [ 95.958434] RIP: 0010:vprintk_emit+0x5b8/0x690 [ 95.958445] Code: 48 b8 00 00 00 00 00 fc ff df 41 80 7c 05 00 00 0f 85 a2 00 00 00 48 83 3d dc bb 1c 07 00 74 29 e8 8d 84 15 00 48 89 df 57 9d <0f> 1f 44 00 00 e9 79 fe ff ff e8 79 84 15 00 0f 0b e8 72 84 15 00 [ 95.958452] RSP: 0018:ffff888071f97a78 EFLAGS: 00000293 ORIG_RAX: ffffffffffffff13 [ 95.958463] RAX: ffff888071f8c340 RBX: 0000000000000293 RCX: 1ffff1100e3f197c [ 95.958470] RDX: 0000000000000000 RSI: ffffffff81557af3 RDI: 0000000000000293 [ 95.958477] RBP: ffff888071f97ac0 R08: ffff888071f8c340 R09: ffff888071f8cbe0 [ 95.958485] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000029 [ 95.958492] R13: 1ffffffff10e46d9 R14: 0000000000000200 R15: ffff888098a1e300 [ 95.958512] ? vprintk_emit+0x5b3/0x690 [ 95.958533] vprintk_default+0x28/0x30 [ 95.958547] vprintk_func+0x7e/0x189 [ 95.958560] printk+0xba/0xed [ 95.958574] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 95.958590] ? tcp_register_app+0x224/0x290 [ 95.958622] __ip_vs_ftp_init.cold+0x5b/0x6a [ 95.958637] ? __ip_vs_ftp_exit+0x60/0x60 [ 95.958653] ops_init+0xb3/0x410 [ 95.958671] setup_net+0x2d3/0x740 [ 95.958685] ? lock_acquire+0x16f/0x3f0 [ 95.958699] ? ops_init+0x410/0x410 [ 95.958722] copy_net_ns+0x1df/0x340 [ 95.958739] create_new_namespaces+0x400/0x7b0 [ 95.958760] unshare_nsproxy_namespaces+0xc2/0x200 [ 95.958776] ksys_unshare+0x440/0x980 [ 95.958816] ? walk_process_tree+0x2c0/0x2c0 [ 95.958833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 95.958858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 95.958871] ? do_syscall_64+0x26/0x620 [ 95.958886] ? lockdep_hardirqs_on+0x415/0x5d0 [ 95.958904] __x64_sys_unshare+0x31/0x40 [ 95.958918] do_syscall_64+0xfd/0x620 [ 95.958947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 95.958958] RIP: 0033:0x45bd47 [ 95.958970] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 1d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 95.958978] RSP: 002b:00007ffd2ed59d18 EFLAGS: 00000202 ORIG_RAX: 0000000000000110 [ 95.958991] RAX: ffffffffffffffda RBX: 000000000075c9a8 RCX: 000000000045bd47 [ 95.958999] RDX: 0000000000000000 RSI: 00007ffd2ed59cc0 RDI: 0000000040000000 [ 95.959007] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 95.959014] R10: 0000000000000000 R11: 0000000000000202 R12: 000000000075c9a8 [ 95.959021] R13: 00007ffd2ed59f88 R14: 0000000000000000 R15: 0000000000000000 [ 95.960139] Kernel Offset: disabled [ 96.466071] Rebooting in 86400 seconds..